callback( { "result":{ "query":":facetid:toc:\"db/series/lncs/lncs10001.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"64.87" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"20", "@dc":"20", "@oc":"20", "@id":"43387176", "text":":facetid:toc:db/series/lncs/lncs10001.bht" } }, "hits":{ "@total":"20", "@computed":"20", "@sent":"20", "@first":"0", "hit":[{ "@score":"1", "@id":"3337417", "info":{"authors":{"author":[{"@pid":"50/7258-2","text":"Martin Hentschel 0002"},{"@pid":"h/ReinerHahnle","text":"Reiner Hähnle"},{"@pid":"78/560","text":"Richard Bubel"}]},"title":"Debugging and Visualization.","venue":"Deductive Software Verification","pages":"383-413","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/0002HB16","doi":"10.1007/978-3-319-49812-6_11","ee":"https://doi.org/10.1007/978-3-319-49812-6_11","url":"https://dblp.org/rec/series/lncs/0002HB16"}, "url":"URL#3337417" }, { "@score":"1", "@id":"3337418", "info":{"authors":{"author":[{"@pid":"91/1275","text":"Wolfgang Ahrendt"},{"@pid":"118/8434","text":"Sarah Grebing"}]},"title":"Using the KeY Prover.","venue":"Deductive Software Verification","pages":"495-539","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/AhrendtG16","doi":"10.1007/978-3-319-49812-6_15","ee":"https://doi.org/10.1007/978-3-319-49812-6_15","url":"https://dblp.org/rec/series/lncs/AhrendtG16"}, "url":"URL#3337418" }, { "@score":"1", "@id":"3337419", "info":{"authors":{"author":[{"@pid":"91/1275","text":"Wolfgang Ahrendt"},{"@pid":"70/5816","text":"Christoph Gladisch"},{"@pid":"150/6567","text":"Mihai Herda"}]},"title":"Proof-based Test Case Generation.","venue":"Deductive Software Verification","pages":"415-451","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/AhrendtGH16","doi":"10.1007/978-3-319-49812-6_12","ee":"https://doi.org/10.1007/978-3-319-49812-6_12","url":"https://dblp.org/rec/series/lncs/AhrendtGH16"}, "url":"URL#3337419" }, { "@score":"1", "@id":"3337427", "info":{"authors":{"author":[{"@pid":"b/BBeckert","text":"Bernhard Beckert"},{"@pid":"h/ReinerHahnle","text":"Reiner Hähnle"},{"@pid":"50/7258-2","text":"Martin Hentschel 0002"},{"@pid":"s/PeterHSchmitt","text":"Peter H. Schmitt"}]},"title":"Formal Verification with KeY: A Tutorial.","venue":"Deductive Software Verification","pages":"541-570","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/BeckertH0S16","doi":"10.1007/978-3-319-49812-6_16","ee":"https://doi.org/10.1007/978-3-319-49812-6_16","url":"https://dblp.org/rec/series/lncs/BeckertH0S16"}, "url":"URL#3337427" }, { "@score":"1", "@id":"3337428", "info":{"authors":{"author":[{"@pid":"b/BBeckert","text":"Bernhard Beckert"},{"@pid":"46/6420","text":"Vladimir Klebanov"},{"@pid":"67/1036-1","text":"Benjamin Weiß 0001"}]},"title":"Dynamic Logic for Java.","venue":"Deductive Software Verification","pages":"49-106","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/BeckertK016","doi":"10.1007/978-3-319-49812-6_3","ee":"https://doi.org/10.1007/978-3-319-49812-6_3","url":"https://dblp.org/rec/series/lncs/BeckertK016"}, "url":"URL#3337428" }, { "@score":"1", "@id":"3337440", "info":{"authors":{"author":[{"@pid":"78/560","text":"Richard Bubel"},{"@pid":"h/ReinerHahnle","text":"Reiner Hähnle"}]},"title":"KeY-Hoare.","venue":"Deductive Software Verification","pages":"571-589","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/BubelH16","doi":"10.1007/978-3-319-49812-6_17","ee":"https://doi.org/10.1007/978-3-319-49812-6_17","url":"https://dblp.org/rec/series/lncs/BubelH16"}, "url":"URL#3337440" }, { "@score":"1", "@id":"3337451", "info":{"authors":{"author":[{"@pid":"34/11095","text":"Stijn de Gouw"},{"@pid":"b/DSsBoer","text":"Frank S. de Boer"},{"@pid":"116/4873","text":"Jurriaan Rot"}]},"title":"Verification of Counting Sort and Radix Sort.","venue":"Deductive Software Verification","pages":"609-618","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/GouwBR16","doi":"10.1007/978-3-319-49812-6_19","ee":"https://doi.org/10.1007/978-3-319-49812-6_19","url":"https://dblp.org/rec/series/lncs/GouwBR16"}, "url":"URL#3337451" }, { "@score":"1", "@id":"3337452", "info":{"authors":{"author":[{"@pid":"33/7963","text":"Daniel Grahl"},{"@pid":"78/560","text":"Richard Bubel"},{"@pid":"71/6269","text":"Wojciech Mostowski"},{"@pid":"s/PeterHSchmitt","text":"Peter H. Schmitt"},{"@pid":"73/9580","text":"Mattias Ulbrich"},{"@pid":"67/1036-1","text":"Benjamin Weiß 0001"}]},"title":"Modular Specification and Verification.","venue":"Deductive Software Verification","pages":"289-351","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/GrahlBMSU016","doi":"10.1007/978-3-319-49812-6_9","ee":"https://doi.org/10.1007/978-3-319-49812-6_9","url":"https://dblp.org/rec/series/lncs/GrahlBMSU016"}, "url":"URL#3337452" }, { "@score":"1", "@id":"3337453", "info":{"authors":{"author":[{"@pid":"33/7963","text":"Daniel Grahl"},{"@pid":"38/4123","text":"Christoph Scheben"}]},"title":"Functional Verification and Information Flow Analysis of an Electronic Voting System.","venue":"Deductive Software Verification","pages":"593-607","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/GrahlS16","doi":"10.1007/978-3-319-49812-6_18","ee":"https://doi.org/10.1007/978-3-319-49812-6_18","url":"https://dblp.org/rec/series/lncs/GrahlS16"}, "url":"URL#3337453" }, { "@score":"1", "@id":"3337454", "info":{"authors":{"author":[{"@pid":"33/7963","text":"Daniel Grahl"},{"@pid":"73/9580","text":"Mattias Ulbrich"}]},"title":"From Specification to Proof Obligations.","venue":"Deductive Software Verification","pages":"243-287","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/GrahlU16","doi":"10.1007/978-3-319-49812-6_8","ee":"https://doi.org/10.1007/978-3-319-49812-6_8","url":"https://dblp.org/rec/series/lncs/GrahlU16"}, "url":"URL#3337454" }, { "@score":"1", "@id":"3337459", "info":{"authors":{"author":{"@pid":"h/ReinerHahnle","text":"Reiner Hähnle"}},"title":"Quo Vadis Formal Verification?","venue":"Deductive Software Verification","pages":"1-19","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/Hahnle16","doi":"10.1007/978-3-319-49812-6_1","ee":"https://doi.org/10.1007/978-3-319-49812-6_1","url":"https://dblp.org/rec/series/lncs/Hahnle16"}, "url":"URL#3337459" }, { "@score":"1", "@id":"3337465", "info":{"authors":{"author":[{"@pid":"76/6612","text":"Marieke Huisman"},{"@pid":"91/1275","text":"Wolfgang Ahrendt"},{"@pid":"33/7963","text":"Daniel Grahl"},{"@pid":"50/7258-2","text":"Martin Hentschel 0002"}]},"title":"Formal Specification with the Java Modeling Language.","venue":"Deductive Software Verification","pages":"193-241","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/HuismanAG016","doi":"10.1007/978-3-319-49812-6_7","ee":"https://doi.org/10.1007/978-3-319-49812-6_7","url":"https://dblp.org/rec/series/lncs/HuismanAG016"}, "url":"URL#3337465" }, { "@score":"1", "@id":"3337467", "info":{"authors":{"author":[{"@pid":"75/7447","text":"Ran Ji"},{"@pid":"78/560","text":"Richard Bubel"}]},"title":"Program Transformation and Compilation.","venue":"Deductive Software Verification","pages":"473-492","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/JiB16","doi":"10.1007/978-3-319-49812-6_14","ee":"https://doi.org/10.1007/978-3-319-49812-6_14","url":"https://dblp.org/rec/series/lncs/JiB16"}, "url":"URL#3337467" }, { "@score":"1", "@id":"3337481", "info":{"authors":{"author":{"@pid":"71/6269","text":"Wojciech Mostowski"}},"title":"Verifying Java Card Programs.","venue":"Deductive Software Verification","pages":"353-380","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/Mostowski16","doi":"10.1007/978-3-319-49812-6_10","ee":"https://doi.org/10.1007/978-3-319-49812-6_10","url":"https://dblp.org/rec/series/lncs/Mostowski16"}, "url":"URL#3337481" }, { "@score":"1", "@id":"3337494", "info":{"authors":{"author":[{"@pid":"79/5611","text":"Philipp Rümmer"},{"@pid":"73/9580","text":"Mattias Ulbrich"}]},"title":"Proof Search with Taclets.","venue":"Deductive Software Verification","pages":"107-147","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/RummerU16","doi":"10.1007/978-3-319-49812-6_4","ee":"https://doi.org/10.1007/978-3-319-49812-6_4","url":"https://dblp.org/rec/series/lncs/RummerU16"}, "url":"URL#3337494" }, { "@score":"1", "@id":"3337496", "info":{"authors":{"author":[{"@pid":"38/4123","text":"Christoph Scheben"},{"@pid":"150/0065","text":"Simon Greiner"}]},"title":"Information Flow Analysis.","venue":"Deductive Software Verification","pages":"453-471","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/SchebenG16","doi":"10.1007/978-3-319-49812-6_13","ee":"https://doi.org/10.1007/978-3-319-49812-6_13","url":"https://dblp.org/rec/series/lncs/SchebenG16"}, "url":"URL#3337496" }, { "@score":"1", "@id":"3337497", "info":{"authors":{"author":{"@pid":"s/PeterHSchmitt","text":"Peter H. Schmitt"}},"title":"First-Order Logic.","venue":"Deductive Software Verification","pages":"23-47","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/Schmitt16","doi":"10.1007/978-3-319-49812-6_2","ee":"https://doi.org/10.1007/978-3-319-49812-6_2","url":"https://dblp.org/rec/series/lncs/Schmitt16"}, "url":"URL#3337497" }, { "@score":"1", "@id":"3337498", "info":{"authors":{"author":[{"@pid":"s/PeterHSchmitt","text":"Peter H. Schmitt"},{"@pid":"78/560","text":"Richard Bubel"}]},"title":"Theories.","venue":"Deductive Software Verification","pages":"149-166","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/SchmittB16","doi":"10.1007/978-3-319-49812-6_5","ee":"https://doi.org/10.1007/978-3-319-49812-6_5","url":"https://dblp.org/rec/series/lncs/SchmittB16"}, "url":"URL#3337498" }, { "@score":"1", "@id":"3337506", "info":{"authors":{"author":[{"@pid":"10/8731","text":"Nathan Wasser"},{"@pid":"h/ReinerHahnle","text":"Reiner Hähnle"},{"@pid":"78/560","text":"Richard Bubel"}]},"title":"Abstract Interpretation.","venue":"Deductive Software Verification","pages":"167-189","year":"2016","type":"Parts in Books or Collections","access":"closed","key":"series/lncs/WasserHB16","doi":"10.1007/978-3-319-49812-6_6","ee":"https://doi.org/10.1007/978-3-319-49812-6_6","url":"https://dblp.org/rec/series/lncs/WasserHB16"}, "url":"URL#3337506" }, { "@score":"1", "@id":"3340853", "info":{"authors":{"author":[{"@pid":"91/1275","text":"Wolfgang Ahrendt"},{"@pid":"b/BBeckert","text":"Bernhard Beckert"},{"@pid":"78/560","text":"Richard Bubel"},{"@pid":"h/ReinerHahnle","text":"Reiner Hähnle"},{"@pid":"s/PeterHSchmitt","text":"Peter H. Schmitt"},{"@pid":"73/9580","text":"Mattias Ulbrich"}]},"title":"Deductive Software Verification - The KeY Book - From Theory to Practice","venue":["Deductive Software Verification","Lecture Notes in Computer Science"],"volume":"10001","publisher":"Springer","year":"2016","type":"Editorship","key":"series/lncs/10001","doi":"10.1007/978-3-319-49812-6","ee":"https://doi.org/10.1007/978-3-319-49812-6","url":"https://dblp.org/rec/series/lncs/10001"}, "url":"URL#3340853" } ] } } } )